Sciweavers

669 search results - page 107 / 134
» Managing the Risk of IT Outsourcing
Sort
View
GEOS
2007
Springer
15 years 6 months ago
A Rule-Based Description Framework for the Composition of Geographic Information Services
SDIs offer access to a wealth of distributed data sources through standardised service interfaces. Recently, also geoprocessing capabilities are offered as services in SDIs. Combin...
Michael Lutz, Roberto Lucchi, Anders Friis-Christe...
UCS
2007
Springer
15 years 5 months ago
RFID Privacy Using Spatially Distributed Shared Secrets
Many of today’s proposed RFID privacy schemes rely on the encryption of tag IDs with user-chosen keys. However, password management quickly becomes a bottleneck in such proposals...
Marc Langheinrich, Remo Marti
WOWMOM
2005
ACM
133views Multimedia» more  WOWMOM 2005»
15 years 5 months ago
A Statistical Matching Approach to Detect Privacy Violation for Trust-Based Collaborations
Distributed trust and reputation management mechanisms are often proposed as a means of providing assurance in dynamic and open environments by enabling principals to building up ...
Mohamed Ahmed, Daniele Quercia, Stephen Hailes
EUROPKI
2004
Springer
15 years 5 months ago
Using EMV Cards for Single Sign-On
Abstract. At present, network users have to manage a set of authentication credentials (usually a username/password pair) for every service with which they are registered. Single S...
Andreas Pashalidis, Chris J. Mitchell
CAISE
2008
Springer
15 years 1 months ago
Refactoring Process Models in Large Process Repositories
With the increasing adoption of process-aware information systems (PAIS), large process model repositories have emerged. Over time respective models have to be re-aligned to the re...
Barbara Weber, Manfred Reichert